Tag: technology
Questions Related to technology
-
delete j
-
free j
-
it is not supposed to be deleted
-
delete [] j
-
The program should be started with root privileges. Then it should use setuid(UID) to change privileges between root and another account.
-
The program should be started with root privileges. Then it should use seteuid(UID) to change privileges between root and another account.
-
Starting the program as root is a security risk. The program should run with least privileges and obtain root using seteuid(UID) whenever necessary.
-
The program has to run with root privileges entirely. Once root privileges are dropped they cannot be regained.
-
value of tree
-
value of node
-
value of i
-
garbage-- its a dangling pointer
-
Since the file name is hard coded, fopen() will fail if the file already exists
-
0600 is not a secure option. The parameter 0600 should be changed to 0666
-
Attackers can exploit by creating a symboling link /tmp/cache_data that points to a system file
-
Attackers can exploit the application's cache by writing directly to /tmp/cache_data
-
Overwriting freed memory is a security vulnerability
-
Depends on the application and how important “somedata” is
-
This will result in a buffer overflow since the freed memory location cannot handle 8 characters of data “somedata”
-
strcpy() will fail as it cannot write to already freed memory, and the application will crash
-
Fiber Data Distributed Interface
-
Fiber Distributed Data Interface
-
Fiber Distributed Digital Interface
-
Fiber Digital Ditributed Interface
-
Internet Connection Messgae Protocol
-
Internet COntrol messgae protocol
-
Internet Control Management Protocol
-
Internet Control Messgae Protocol
-
Lightweight Directory Access Protocol
-
Lightweight Data Access Protocol
-
Lightweight Distributed Access Protocol
-
LightWeight Access Protocol
-
Synchronous Network Management Protocol
-
Simple Network Management Protocol
-
Simple Network Message Protocol
-
Simple Network Messaging Protocol
-
Digital Host Connection Protocol
-
Digital Host Configuration Protocol
-
Dynamic Host Connection Protocol
-
Dynamic Host Configuration Protocol